Abstract is missing.
- Finger verification Using SVD featuresAla Balti, Mounir Sayadi, Farhat Fnaiech. 1-5 [doi]
- Trusted integration of cloud-based NFC transaction playersPardis Pourghomi, Muhammad Qasim Saeed, Gheorghita Ghinea. 6-12 [doi]
- Flexibility vs. security in linked enterprise data access control graphsMarkus Graube, Patricia Órtiz, Manuel Carnerero, Óscar Lázaro, Mikel Uriarte, Leon Urbas. 13-18 [doi]
- Information flow policies vs malwareRadoniaina Andriatsimandefitra, Thomas Saliou. 19-24 [doi]
- Hierarchical object log format for normalisation of security eventsAndrey Sapegin, David Jaeger, Amir Azodi, Marian Gawron, Feng Cheng 0002, Christoph Meinel. 25-30 [doi]
- Detecting stepping-stones under the influence of packet jitteringWei Ding, Khoa Le, Shou-Hsuan Stephen Huang. 31-36 [doi]
- ARMLCC: Adaptive and recovery-based Multi-Layer Connected Chain Mechanism for Multicast Source AuthenticationHamdi Eltaief, Ali El Kamel, Habib Youssef. 37-42 [doi]
- A professional view on ebanking authentication: Challenges and recommendationsJorge Aguila Vila, Jetzabel Serna-Olvera, Luis Fernandez, Manel Medina, Andreas Sfakianakis. 43-48 [doi]
- Quantitative penetration testing with item response theoryFlorian Arnold, Wolter Pietersy, Mariëlle Stoelinga. 49-54 [doi]
- How to grant less permissions to facebook applicationsGianpiero Costantino, Fabio Martinelli, Daniele Sgandurra. 55-60 [doi]
- Towards enforcing on-the-fly policies in BYOD environmentsGianpiero Costantino, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra. 61-65 [doi]
- The state of the art of risk assessment and management for information systemsLulu Liang, Wang Ren, Jing Song, Huaming Hu, Qiang He, Shuo Fang. 66-71 [doi]
- Enhanced P2P botnets detection framework architecture with hybrid analyzer: Host-based and network-basedRaihana Syahirah Abdullah, M. A. Faizal, Zul Azri Muhamad Noh, Siti Rahayu Selamat, Mohd Zaki Mas'ud, Shahrin Sahib. 72-77 [doi]
- Profiling mobile malware behaviour through hybrid malware analysis approachMohd Zaki Mas'ud, Shahrin Sahib, Mohd Faizal Abdollah, Siti Rahayu Selamat, Robiah Yusof, Rabiah Ahmad. 78-84 [doi]
- A survey on digital tracing traitors schemesFaten Chaabane, Maha Charfeddine, Chokri Ben Amar. 85-90 [doi]
- Privacy preserving processing of data decision tree based on sample selection and Singular Value DecompositionPriyank Jain, Neelam Pathak, Pratibha Tapashetti, A. S. Umesh. 91-95 [doi]
- A secured model for Indian e-health systemShilpa Srivastava, Namrata Agarwal, Millie Pant, Ajith Abraham. 96-101 [doi]
- A system of abnormal behaviour detection in aerial surveillanceAhlem Walha, Ali Wali, Adel M. Alimi. 102-107 [doi]
- An intelligent system for video events detectionYassine Aribi, Ali Wali, Adel M. Alimi. 108-113 [doi]
- Developing ECC applications in Java CardV. Gayoso Martinez, Luis Hernández Encinas. 114-120 [doi]
- A wavelet network speech recognition system to control an augmented reality objectDhekra Bousnina, Ridha Ejbali, Mourad Zaied, Chokri Ben Amar. 121-124 [doi]